126,393 research outputs found

    A Recursive Threshold Visual Cryptography Scheme

    Get PDF
    This paper presents a recursive hiding scheme for 2 out of 3 secret sharing. In recursive hiding of secrets, the user encodes additional information about smaller secrets in the shares of a larger secret without an expansion in the size of the latter, thereby increasing the efficiency of secret sharing. We present applications of our proposed protocol to images as well as text.Comment: 8 page

    Information Hiding in Images Using Steganography Techniques

    Get PDF
    Innovation of technology and having fast Internet make information to distribute over the world easily and economically. This is made people to worry about their privacy and works. Steganography is a technique that prevents unauthorized users to have access to the important data. The steganography and digital watermarking provide methods that users can hide and mix their information within other information that make them difficult to recognize by attackers. In this paper, we review some techniques of steganography and digital watermarking in both spatial and frequency domains. Also we explain types of host documents and we focused on types of images

    Lossless data hiding using bit-depth embedding for JPEG2000 compressed bit-stream

    Get PDF
    We have proposed a reversible information hiding for binary images. In this paper, we presents a lossless data hiding method for JPEG2000 compressed data based on the reversible information hiding. In JPEG2000 compression, wavelet coefficients of an image are quantized,therefore, the least significant bit plane (LSB) can be extracted. The proposed method recovers the quantized wavelet coefficients of cover images from stego images. To realize this, we embed not only secret data and the JBIG2 bit-stream of a part of the LSB plane but also the bit-depth of the quantized coefficients on some code-blocks.Experimental results demonstrate the feasibility of application of the proposed method to image alteration detection for JPEG2000 compressed data.2008 International Conference on Intelligent Information Hiding and Multimedia Signal Processing, 15-17 Aug. 2008, Harbin, Chin

    Optimal Color Model for Information Hidingin Color Images

    Get PDF
    In present work the effort has been put in finding the most suitable color model for the application of information hiding in color images. We test the most commonly used color models; RGB, YIQ, YUV, YCbCr1 and YCbCr2. The same procedures of embedding, detection and evaluation were applied to find which color model is most appropriate for information hiding. The new in this work, we take into consideration the value of errors that generated during transformations among color models. The results show YUV and YIQ color models are the best for information hiding in color images

    An efficient data hiding method in images

    Get PDF
    Data Hiding has a huge range of applications in the medical field for transmission. It is helpful in securing the documentation of the patients from the violator with good storage space. The medical images of different modalities like CT, MRI, and PET with the digitized clinical information can be sent to the doctors across the world for the treatment. Due to the bandwidth and storage constraints, medical images along with the clinical information must be compressed before transmission and storage. This paper gives a technique for hiding the digitized clinical information along with the DICOM images in Complex Contourlet Transform (CCT) Domain. It also analyses the compression method by using an Entropy Encoder method. Hence, this work suggests that the data hiding method based on Complex Contourlet Transform (CCT) is efficient and also it has a high hiding capacity. The improved value of Compression Ratio (CR), Space Saving (SS), Mean Square Error (MSE) and Peak Signal to Noise Ratio (PSNR) shows that the new method satisfies the properties of the data hiding method

    An overview on audio steganography techniques

    Get PDF
    Steganography is a form of security technique through obscurity; the science and art of hiding the existence of a message between sender and intended recipient. Steganography has been used to hide secret messages in various types of files, including digital images, audio and video. The three most important parameters for audio steganography are imperceptibility, payload (bit rate or capacity), and robustness. Any technique which tries to improve the payload or robustness should preserve imperceptibility. The noise which is introduced due to bit modification would limit payload. This paper presents a categorization of information hiding techniques and overviews those techniques that intend to improve payload and imperceptibility

    Survey on Reversible Data Hiding in Encrypted Images Using POB Histogram Method

    Get PDF
    This paper describes a survey on reversible data hiding in encrypted images. Data hiding is a process to embed useful data into cover media. Data invisibility is its major requirement. Data hiding can be done in audio, video, image, text, and picture. Here use an image for data hiding especially digital images and existing method (Histogram Block Shift Base Method) HBSBM or POB. Now a day's reversible data hiding in encrypted images is in use due to its excellent property which is original cover image can be recovered with no loss after extraction of the embedded data. Also, it protects the original data. According to the level and kind of application one or more data hiding methods is used. Data hiding can be done in audio, video, text, and image and other forms of information. Some data hiding techniques emphasize on digital image security, some on the robustness of digital image hiding process while other's main focus is on imperceptibility of a digital image. The capacity of digital information which has to hide is also the main concern in some of the applications. The objective of some of the papers mentioned below is to achieve two or more than two parameters i.e. Security, robustness, imperceptibility and capacity but some of the parameters are trade-off which means only one can be achieved on the cost of other. So the data hiding techniques aiming to achieve maximum requirements i.e. security, robustness, capacity, imperceptibility etc. and which can be utilized in the larger domain of applications is desired. Related work for techniques used for data hiding in a digital image is described in this paper
    corecore